Copy
ITSPmagazine | At the Intersection of IT Security & Society™
View this email in your browser
October 9, 2017

This ITSPmagazine Newsletter is Sponsored by

October is National Cyber Security Awareness Month, and Halloween is coming up.
Be a bit paranoid. Have a cookie!

In the meantime, enjoy the latest articles from ITSPmagazine




DiverseIT
Neil Barnett, Microsoft And Marian Merritt, NICE Shatter The Myths Around Cybersecurity And Autism

Neil Barnett, Director of Inclusive Hiring at Microsoft, and Marian Merritt, Lead for Industry Engagement at the National Initiative for Cybersecurity Education, chat with ITSPmagazine’s Selena Templeton for the Diverse IT podcast about cybersecurity and autism.
by Selena Templeton



Bug Bounties
History And Interesting Facts About Bug Bounties | An AppSec USA 2017 Panel Recap

During a panel at OWASP AppSec USA 2017, Cassio Goldschmidt, Sean Melia, Michael Stoker, and Michael Gallagher shared their expertise and unique perspectives on when, how, and why to consider a bug bounty program as part of an overall application security program. These are the highlights.
by Sean Martin, CISSP



Denial of Business
Humans Vs. Bots Online Battle - Most Of The Time We Lose

Bots are controlling online sites all over the world: from ticket sales to social media to consumer gaming sites. Sometimes humans benefit from it (such as game cheats), but most of the time humans get screwed. Kevin Gosschalk from FunCaptcha shares a few stories they have seen.
by Sean Martin, CISSP



Cyber Society
On The Internet, Nobody Knows You're A Dog! Also, Nobody Could Know For Sure That You’re NOT A Dog.

In this podcast episode, we are going to talk about dogs on the Internet and how difficult it is to distinguish them from humans. We are talking about dogs pretending to be humans, and being so good at it that no one can tell. This is a serious problem, and we all need to be aware of it.
by Marco Ciappelli



Cyber Talent
Staying Relevant And Visible In Your InfoSec Career

While certainly not enough to my liking, there are still some articles describing ways to enter the field of information security. There are, in my view, far fewer dedicated to helping people succeed and excel in the industry. Since Robert Feeney recently wrote on this topic, I decided to have a conversation with him to learn more about his views.
by Sean Martin, CISSP



Cyber Training
Cybersecurity Experts Must Look At The Whole Picture

Let’s face it, in the CyberSecurity profession, we like to learn things the hard way. But, if we look at the whole picture and ask "why" every now and then, things just might get a little easier.
by Candy Alexander



Cyber Defense
How To Manage Security Risks And Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.
by Mordecai Rosen



Open Source Software
How To Mentor The Next Generation Of Technologists

My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.
by Charles Eaton

 
Sponsored content

Cyber Security Summit   |   Boston

ITSPmagazine Readers Receive a Discounted Rate of $95


The Cyber Security Summit is a one-of-a-kind, conference series designed for exclusively invited C-Suite & Senior Level Executives in need of innovative solutions to protect their company's critical infrastructure and learn about the latest cutting-solutions from emerging and established solution providers, subject matter experts and powerful cyber thought leaders. Interactive panel discussions will cover the growing Compliance Nightmare, Threats Facing IoT & Big Data along with Corporate Espionage & Insider Threat. Executives in attendance will enjoy a catered breakfast, lunch & cocktail reception with fellow business leaders. 

ITSPmagazine readers are invited to receive $95 admission to all remaining 2017 summits, including the upcoming event in Boston. Use the the ITSPmagazine Promo Code when you register: Boston, MA code: ITSPMAGMA
 
Use the code ITSPMAGMA to claim your discount today


Sponsored content

Small and Medium Business Cyber Security Education 

COMING SOON
EXPERT WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES

Cybersecurity Advice For Small And Medium Businesses

ITPSmagazine will be partnering with industry luminaries from around the world that have the first-hand experience and the expertise to help us raise awareness for this massive, underserved group of companies. In addition to raising awareness, we will begin to share stories of success and best practices that will help small- and medium-sized businesses take the first and subsequent steps necessary to address the cyber risks they face - increasing their security posture without breaking the bank.

LEARN MORE

Catch the Latest Webinars and Webcasts on ITSP TV

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
Share
Tweet
Share
+1
Forward

Interested in advertising with ITSPmagazine to reach our growing audience? Great!
Let's Go Places Together!
Inquire about ITSPmagazine sponsorship opportunities

Keep in touch with us

An

imsmartin consulting
publication
Copyright © 2017 ITSPmagazine, an IMSMARTIN publication, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list